I followed instruction from there:
I got working I2P over tor in whonixGW1 machine
installed foxyproxy to torbrowser.
killyourtv proxyfoxy config file is outdated,
so I configured this forxyproxy by hand.
Now my TB open i2p sites as it should and open other sites, and onion thru the TOR PROXY.
Now question. Is it really change browser fingeprinting?
I did some lousy reserch…
made another whonixGW2 (whonix gateway proxy machine)
made another whonix-WS2 from original template
downloaded into it tor-browser-for-linux64
and installed it
now i have 2 different VMs
whonixWS1 (torbrowser with foxyproxy and i2p support) -> whonixGW1
whonixWS2 (original torbroswer (pgp checked)) -> whonix GW2 (original)
I did search and go to 4 sites one by one.
every site for WS1 and WS2 show same fingerprint!
So question is it safe use at daily basis whonixWS1 (torbrowser with foxyproxy and i2p support)? Or for site admin is obvious, that browser in WS1 modified and rare case.?
Thank you for your work!